Inglés profesional UD08
|
|
Título del Test:
![]() Inglés profesional UD08 Descripción: STAYING SAFE |



| Comentarios |
|---|
NO HAY REGISTROS |
|
1º ACTIVIDAD. . The door ... I was trying to open was locked. Whose. Who. Which. Where. The police officer ... arrested the suspect was praised for his bravery. Whose. Which. Who. Where. The computer ... was stolen contained confidential information. Where. Who. Which. Whose. The security guard said: «I saw a suspicious person entering the building». The security guard said that he had been robbed at gunpoint. The security guard warned that a suspicious person was entering the building. The security guard reported that he had seen a suspicious person entering the building. The security guard asked if a suspicious person was entering the building. It’s the invention ... changed actual communication. Who. Whose. What. Which. The police officer warned: «Be careful, the area is not safe». The police officer said that the area was not safe. The police officer said that he had been robbed at gunpoint. The police officer warned that he had seen a suspicious person entering the building. The police officer reported that the area was not safe. ... is a technique used by attackers to trick users into revealing confidential information or taking actions that compromise their security. Intrusion prevention system. Password policy. Social engineering. Firewall. ... is the process of scrambling data so that it cannot be read by unauthorised individuals. Authorization. Intrusion detection system. Data encryption. Authentication. ... is a network security device that filters incoming and outgoing traffic to prevent unauthorized access to a network. Authentication. Intrusion detection system. Data encryption. Firewall. ... is a set of rules that govern the creation and use of passwords. Authorization. Password policy. Data encryption. Authentication. Choose the correct reported speech «We need to finalize the marketing budget by next week», said the manager. The manager said that they had needed to finalize the marketing budget by next week. The manager said, they need to finalize the marketing budget by next week. The manager said that I needed to finalize the marketing budget by next week. The manager said that they needed to finalize the marketing budget by next week. Choose the correct reported speech The client asked: «Can you provide a discount for bulk orders?». The client asked if the company provided a discount for bulk orders. The client asked if the company will provide a discount for bulk orders. The client asked if the company could provide a discount for bulk orders. The client asked what the company provide as a discount for bulk orders. Choose the correct reported speech Sarah announced: «I’ve completed the research report on our competitor». Sarah announced that she has completed the research report on their competitor. Sarah announced that she completes the research report on their competitor. Sarah announced that she had completed the research report on their competitor. Sarah announced that she completed the research report on their competitor. Choose the correct reported speech: «The deadline for the project is the 15th of June», the team leader reminded everyone. The team leader reminded everyone that the deadline for the project was the 15th of June. The team leader reminded everyone that the deadline for the project had been the 15th of June. The team leader reminded everyone that the deadline for the project has been the 15th of June. The team leader reminded that the deadline for the project is the 15th of June. Choose the correct reported speech: John suggested: «We should launch a social media campaign to promote our new product». John suggested that they had launched a social media campaign to promote their new product. John suggested launching a social media campaign to promote their new product. John suggested to launch a social media campaign to promote their new product. John suggested to launching a social media campaign to promote their new product. 2º ACTIVIDAD. . The company, _____________ is committed to protecting its data from unauthorized access, has implemented a comprehensive security program. which. whose. The security team regularly conducts vulnerability assessments to identify potential security risks _____________ could affect the company's operations. that. which. The employee training program, _____________ covers a wide range of security topics, aims to equip employees with the knowledge and skills they need to protect the company's data. which. where. The company's policy, _____________ prohibits employees from using personal devices for work-related activities, helps to safeguard the company's confidential information. which. who. The company's disaster recovery plan, ____________ is meticulously designed and regularly tested, ensures that business operations can continue seamlessly in the event of a security incident. which. where. Change the following sentences from direct speech to reported speech: The security manager said: «We need to strengthen our password policy to protect against unauthorised access.». Change the following sentences from direct speech to reported speech: The IT director announced: «The company will be implementing two-factor authentication for all employees.». Change the following sentences from direct speech to reported speech: The HR representative told us: «Please, be careful about what information you share online, especially on social media.». Change the following sentences from direct speech to reported speech: The compliance officer warned: «Never open email attachments from unknown senders, as they may contain malware.». 1. A ______________ is a malicious attempt to gain unauthorised access to a computer system or network. 2. ______________ are procedures and technologies that limit access to a system or data to authorised users only. 3. Regularly updating software and conducting ______________ can help protect against cyberattacks. 4. ______________ are methods used by attackers to trick people into revealing sensitive information or clicking on malicious links. 5. Businesses should create a ______________ where employees prioritise cybersecurity best practices. 6. ______________ scramble data into an unreadable format to protect it from unauthorised access. 7. A recent news report discussed a major ______________, where sensitive customer data was leaked from a company. encryption protocols. cyberattack. data breach. security-conscious environment. social engineering attacks. security awareness training. access controls. 1. A strong _____________ enforces rules for creating complex and unique passwords. 2. _____________ is the process of verifying a user’s identity before granting access. 3. _____________ determines what actions a user can perform after successful authentication. 4. _____________ scrambles data into a coded format, making it unreadable without a decryption key. 5. A _____________ acts as a barrier, monitoring incoming and outgoing network traffic to block unauthorised access attempts. 6. _____________ warns about suspicious activity on a network, 7. while an _____________ actively blocks potential cyberattacks. 8. Hackers may use _____________ techniques to trick people into revealing personal information or clicking on malicious links. 9. _____________ enforces restrictions on who can access specific systems or data based on the user’s identity and privileges. firewall. authentication. intrusion prevention system (IPS). access control. data encryption. password policy. social engineering. authorization. intrusion detection system (IDS). 1. The new marketing campaign, _____ targets young adults, is showing promising results. 2. Mr. Jones, _____ has been with the company for 20 years, is a valuable asset to our team. 3. The contract, _____ details are still being finalised, outlines the terms of the partnership. 4. We are looking for a candidate _____ has experience in international trade. 5. The software _____ we recently installed has streamlined our operations significantly. 6. The presentation, _____ focused on customer satisfaction, was well-received by the board. 7. Investors are interested in companies _____ are developing sustainable solutions. 8. The deadline for applications, _____ is next Friday, is approaching quickly. 9. The department _____ deals with customer service is located on the ground floor. 10. The client _____ we met yesterday expressed interest in our new product line. 5. 6. 7. 8. 4. 10. 2. 3. 1. 9. Fill in the blanks with the appropriate relative pronoun: who. that. which. whose. where. Change the direct speech into reported speech. The security guard said: «I saw a suspicious person entering the building.». Change the direct speech into reported speech. The police officer warned: «Be careful, the area is not safe.». Change the direct speech into reported speech. The victim reported: «I was robbed at gunpoint.». Change the direct speech into reported speech. The witness said: «I saw the suspect running away.». Change the direct speech into reported speech. The detective asked: «Did you see anything suspicious?». 1. ________ is the process of restricting access to resources to authorised users only. 2. ________ is the process of verifying a user’s identity. This typically involves checking a user’s credentials, such as a username and password. 3. ________ is the process of granting users the appropriate level of access to resources based on their roles and permissions. 4. ________ is the process of scrambling data so that it cannot be read by unauthorised individuals. This helps to protect sensitive information from theft or disclosure. 5. A ________ is a network security device that filters incoming and outgoing traffic to prevent unauthorised access to a network. 6. ________ is a network security device that monitors network traffic for suspicious activity. When it detects suspicious activity, it generates an alert. 7. ________ is a network security device that not only detects suspicious activity but also takes action to block it, such as dropping packets or resetting connections. 8. A ________ is a set of rules that govern the creation and use of passwords. Strong password policies can help to prevent unauthorised access to systems and data. 9. ________ is a technique used by attackers to trick users into revealing confidential information or taking actions that compromise their security. authentication. authorization. data encryption. an intrusion prevention system (IPS). password policy. social engineering. firewall. access control. an intrusion detection system (IDS). 3º ACTIVIDAD. . 1. A workplace culture that emphasises the importance of data security and encourages employees to take responsibility for protecting sensitive information. 2. Programs designed to educate employees about security risks and how to protect sensitive data. 3. Attempts to manipulate individuals into revealing confidential information or taking actions that compromise security. 4. Methods that restrict who can access and use data within a computer system or network. 5. Techniques that scramble data into an unreadable format to protect it from unauthorised access. 6. A deliberate attempt to disrupt or gain unauthorised access to a computer system or network. 7. A cyber attack that aims to steal or damage sensitive data. Social engineering attacks. Security awareness training. Access controls. Cyber attack. Security-conscious environment. Data breach. Encryption protocols. The new security system, __________ has been installed by a reputable company, is expected to provide a high level of protection. Which. Who. The company has a team of security experts __________ are responsible for monitoring the network for suspicious activity. Which. Who. The security breach __________ occurred last week was caused by a phishing attack. Which. Who. The company is investigating __________ leaked confidential customer information. Which. Who. The employees __________ are responsible for handling sensitive data need to be extra careful about protecting it from unauthorised access. Which. Who. Match the direct and indirect (reported) speech forms. Present simple. Present Continuous. Past simple. «will». «can». «tomorrow». Read the passage and fill in the gaps with the correct form of the verb in parentheses. The security officer (to inform) ______________(1) us that the company (to implement) ______________(2) new security measures to protect our sensitive data. He (to say) ______________(3) that the measures (to include) ______________(4) stronger passwords, stricter access controls, and regular security audits. He also (emphasise) ______________(5) that it is important for all employees to be aware of the security risks and to take steps to protect their own data. would implement. emphasized. said. would include. informed. Commerce has become increasingly reliant on digital transactions, making it more important than ever to protect sensitive information from ____________(1) and ____________(2). Retailers and financial institutions have implemented a variety of security measures, including ____________(3), ____________(4), and ____________(5), to safeguard customer data. However, even with these measures in place, ____________(6) may still be able to gain access to personal information. It is therefore important for consumers to take steps to protect themselves, such as using strong passwords, avoiding clicking on suspicious links, and reviewing bank statements for ____________(7). Additionally, consumers should be aware of ____________(8) on credit cards and debit cards, as these can be a target for ____________(9). fraud detection systems. unauthorized activity. criminals. unauthorized parties. identity theft. encryption. computer crime. unused balances. firewalls. Match the sentences related to security on the left with the corresponding Sustainable Development Goal on the right. 1. Protecting intellectual property and trade secrets can help to foster innovation and growth in the business sector. 2. Addressing the digital divide and ensuring that everyone has access to reliable and affordable Internet access can help to reduce inequality and promote social inclusion. 3. Reducing our reliance on single-use plastics and other non-recyclable materials can help to protect the environment and prevent cyber threats related to the management of waste. 4. Addressing cyber crime and promoting cyber security cooperation can help to prevent conflict, protect human rights, and strengthen institutions. Responsible consumption and production. Reduced inequalities. Peace, justice and strong institutions. Decent work and economic growth. Read each part of the statement carefully. Determine which category each part belongs to. Match each part to the correct category. 1. Imagine entering your home, and the system instantly recognizing your presence through a unique energy signature, illuminating your path with soft, welcoming lights. 2. This advanced security system not only safeguards your physical space but also monitors environmental factors, ensuring optimal health and safety conditions for you and your loved ones. 3. By harnessing cutting-edge quantum encryption, the system ensures that your personal data remains invulnerable to any external breaches, setting a new standard in data security. 4. While enhancing personal safety, the system also raises questions about privacy and the balance between security and freedom, prompting discussions on ethical technology use. Innovation. Benefits. Implications. Vivid Language. |





